Educational Institutes |
|
Unified Threat Management for a safe and secure academic environment |
|
According to the Journal of the American Academy of Pediatrics, 42 percent of surveyed teens were found to have seen pornography on websites — a full two-thirds of them had come across the content accidentally, possibly through misspelled web addresses, pop-up ads that enter the network via malware or spam mails. What’s more, nine percent of the incidents reportedly occurred while the teens were at school. |
|
Educational institutions, like enterprises, need to go beyond just filtering and have complete security in place to protect users against blended threats like spyware, phishing and more. Complete protection lies in installing not just filtering software, but a complete set of security solutions |
|
Cyberoam delivers complete Internet security to educational institutions for creating not just a secure network, but also a safe academic environment. |
|
Cyberoam Identity-based UTM offers complete Internet security to institutions with Firewall-VPN, Anti-Virus, Anti-Spam, Intrusion Detection and Prevention, Content Filtering in addition to Bandwidth Management and Multiple Link Management over a single platform. |
|
|
 |
|
Cyberoam functions on the basis of user identity rather than on IP addresses, eliminating the need for complex IP pooling. This reduces the complexities involved in creating and implementing security policies in a dynamic setting in an educational institution where large numbers of users (Students and Faculty) exit at the end of every academic year while an equally large number enters each year. |
|
|
|
In the Multiple User-Single Machine situation faced by educational institutions and libraries where multiple students and faculty access the Internet over shared machines, Cyberoam is the only solution that can pinpoint the user who has accessed unauthorized porn, dating, hacking sites, carried out illegal P2P file sharing, gaming, gambling, extensive non-academic chatting, downloaded virus-carrying files, or received excessive, non-academic spam. |
|
|
|
A user-based solution would enable schools and libraries to assign policies based on the user requirement and set temporary or permanent policies to groups or individual students who require access to sites that are normally blocked. In addition to creating lenient policies for faculty and administrators, it can recognize frequent visitors among adult patrons and assign individualized policies on login, eliminating the need for daily manual intervention. Such a solution recognizes users logged anywhere in the network, allowing them personalized internet access policy. |
|
|
|
By identifying the users within the network, even in Wi-Fi and DHCP scenarios, it allows administrators to zero in on harmful activity within the network instantly. In addition, this approach can instantly identify internal users indulging in activity that is harmful to fellow students like cyber bullying or anything that may compromise the institution’s network itself. |
|
|
|
Cyberoam is the only solution that can meet the security needs even in a DHCP and Wi-Fi environment effectively. |
|
|
 |
|
The US Congress in December 2000, enacted the Children's Internet Protection Act (CIPA) to deal with the issues concerning Internet access in schools and libraries. CIPA requires that schools and libraries which receive funding for Internet access under the E-Rate program must have an Internet Safety Policy in place, ensuring the safety and security of minors online. |
|
|
|
With Cyberoam, school district can comply with CIPA requirements, helping them qualify for E-rate funding. Cyberoam's powerful web and email content filtering allows school districts and libraries to enforce an Internet safety policy that blocks and filters Internet access in accordance with CIPA requirements. Cyberoam identifies student activity by the user name instantly, enabling institutions to easily monitor online activities, which is not possible with IP-address based solutions. In doing so, Cyberoam prevents students, faculty and administration from accessing inappropriate matter on the Internet, protects them when using e-mail, chat rooms and more in addition to preventing them from disclosing personal or confidential information. |
|
|
 |
|
Traditional and emerging threats, including viruses, worms, Trojans, DoS attacks, spyware, phishing, pharming are taking a blended approach to enter the network, using the weakest link in the security chain - The user - to gain entry. |
|
|
|
These threats rely on the cover of user anonymity as they are identified by an IP address. Positive identification is virtually impossible without the user name. Hence, user identity-based approach is critical for dependable security for the educational institution. |
|
|
|
Cyberoam’s granular user-based policies offer a high degree of flexibility in operation and control, in contrast to obsolete blanket policies based on IP address. They ensure high scalability with no compromise on security, offering policy-based controls for individual users, groups, departments and applications. |
|
|
|
In the dynamic IP scenario of Wi-Fi access, these policies ensure the same level of control and security as in a wired network. |
|
|
 |
|
Cyberoam is the only unified threat management solution that offers comprehensive time-based access policies. These policies are particularly suited to the unique requirements of educational institutions where effective Internet access management is based on scheduled, time-based access to student batches. |
|
|
|
Such policies provide automatic controls over the time spent by students over the Internet, ensuring sufficient Internet access time for all. Accounts can be created based on hours, days and time of the day. In addition, Cyberoam delivers accounting on hours and data transfer by user and host, making the task of planning and policy-setting more effective. |
|
|
 |
|
Cyberoam’s focus on the institution’s requirements enables it to deliver complete protection over web, IM, P2P traffic, completely controlling access. With 50 % youth accidentally landing on a porn site, Cyberoam controls this factor with its content filtering solution. This reduces threat incidence, acting as a complement to gateway level anti-virus and spyware protection. |
|
|
|
This comprehensive protection ensures that student research work is not virus-infected or lost due to the presence of viruses, worms or Trojans in the network or that the network is up for uninterrupted Internet access. |
|
|
|
Also, Cyberoam’s comprehensive controls ensure protection from upload of sensitive images and video files that could tarnish the institution’s reputation. Anti-spam prevents porn and scam related spam from being delivered into the institute’s mail boxes, preserving a safe academic environment. This in turn reduces the institution’s legal liability. |
|
|
 |
|
The Cyberoam appliances are easy to deploy with no integration problems and are easy to manage and implement. Their easy to use GUI requires hardly any technical knowledge, reducing the need for qualified technical manpower. |
|
|
|
Easy policy setting for students up to thousands when the academic year begins, as well as the user-based policy supported easy resetting when the students move to higher academic levels, makes it a simple process that can be completed in less than a day. |
|
|
 |
|
Effective bandwidth and access time controls prevent bandwidth choking and ensure that all the users, including students, staff and administration get sufficient bandwidth and access time. By implementing policies that control access time to users, departments and applications, Cyberoam ensures that no single user or group takes an inordinate share of Internet time or bandwidth. |
|
|
 |
|
Cyberoam's Traffic Discovery brings suspicious traffic patterns to the IT department’s notice as they happen and its on-appliance reporting offers a range of analytical reports that show trends in Internet usage. This enables IT department to identify emerging applications, pattern changes in usage and fine tune institute policies accordingly, supporting the creation of advanced levels of security and productivity. |
|
|
|
Cyberoam appliances - CR50i, CR100i, CR250i, CR500i, CR1000i and CR1500i, suit the requirements educational institutions of all sizes. Cyberoam’s comprehensive security protects the educational institutions from Internet threats, including spyware, phishing, pharming, viruses, worms, Trojans and more. |
|
|
|
Cyberoam offers measurable and intangible benefits to educational institutions: |
|
|
|
 |
Eliminates IP address an intermediate component to identify and control the students |
|
 |
Provides complete Student/Faculty/Admin security in any environment, including DHCP and Wi-Fi |
|
 |
Allows students to carry their access rights anywhere in the network |
|
 |
Controls non-academic, non productive surfing and bandwidth abuse |
|
|
Download the information paper on CIPA Compliance with Cyberoam |
Download free evaluation copy. |
For price quote or further product detail, contact us. |
|
|
|
 |
|
|